2022
DOI: 10.1016/j.seta.2022.102311
|View full text |Cite
|
Sign up to set email alerts
|

Outlier detection with optimal hybrid deep learning enabled intrusion detection system for ubiquitous and smart environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
15
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 16 publications
(15 citation statements)
references
References 13 publications
0
15
0
Order By: Relevance
“…It even leads to failure to manufacture some parts [45]. The island scanning strategy proved to be a helpful method for reducing residual stress due to the decreased scanning length [6]. However, an overlap region between the islands ensured the close metallurgical bonding of the materials between the islands.…”
Section: Overlap Ratementioning
confidence: 99%
See 2 more Smart Citations
“…It even leads to failure to manufacture some parts [45]. The island scanning strategy proved to be a helpful method for reducing residual stress due to the decreased scanning length [6]. However, an overlap region between the islands ensured the close metallurgical bonding of the materials between the islands.…”
Section: Overlap Ratementioning
confidence: 99%
“…Besides, in AM technologies, especially SLM printing, energy consumption is higher than in traditional manufacturing processes such as casting [4]. High energy consumption in SLM printing is not desired for modern manufacturing when green technologies are getting more attention [5,6]. Therefore, it is also essential to properly select manufacturing parameters such as LASER power to minimize power consumption.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Different security strategies and technologies have been developed to protect network security. Intrusion detection is a traditional network security technique [5][6][7]. An earlier intrusion detection system (IDS) mainly utilizes misuse detection.…”
Section: Introductionmentioning
confidence: 99%
“…So, it is very essential tibuid a network with high security [7], [8]. So, a highly defensive modern network with new security requirements is essential to overcome the network from such attacks [9], [10].…”
mentioning
confidence: 99%